POLICE Logo
MenuMENU
SearchSEARCH
Enter keywords to search across all content
Newsby Staff WriterJuly 8, 2011

ATC-NY Releases Dropbox Reader Forensics Tool

Dropbox Reader, which is used to analyze files on a hard drive, can run on Windows, Macintosh, and Linux systems. With Dropbox Reader, you can acquire information about the registered Dropbox account, shared directories, and synchronized files.

Read More →
Newsby Staff WriterJune 24, 2011

Arizona LE Accounts Hacked by Anti-SB1070 Internet Pirates

At least eight e-mail accounts of officers were hacked, and leaked documents included gang intelligence briefings, cartel surveillance information, a draft report on racial profiling, and reports on militias and "right-wing extremists."

Read More →
Newsby Staff WriterJune 9, 2011

Report: 25% of Hackers are FBI Informants

The Guardian is citing the publisher of hacker quarterly 2600, who told the publication hackers are "susceptible to intimidation" and are usually willing to work for the feds rather than face long prison terms.

Read More →
Ad Loading...
Newsby Staff WriterMay 2, 2011

Hackers Stole IDs of 2,000 Retired California Officers

In a Sunday evening e-mail, PORAC informed its members that its data server was breached earlier this month. The hackers stole application files of retired associate members going back to 2008.

Read More →
Inside the Badge by Mike AntichNovember 15, 2010

Could Your Patrol Car Be Hacked?

A hacker could manipulate a police vehicle's fuel level gauge, falsify the speedometer reading, display arbitrary dashboard messages, dial-up the heat or A/C, lock passengers in the car, continuously blare the horn, pop the trunk, turn off the lights, activate the windshield wipers, disable the brakes, selectively brake individual wheels on demand, and stop the engine.

Read More →
Newsby Staff WriterNovember 12, 2009

ForensicSoft Releases Updated SAFE Computer Forensic Software

SAFE is a write-blocked Windows forensic boot platform that helps computer forensic experts "confidently acquire, preview and analyze digital evidence to be presented in a court of law," according to the company.

Read More →
Ad Loading...
Newsby Staff WriterSeptember 1, 2009

Miami Prosecutors Argue Man Wanted to Drown Young Girls Because of Sex Fetish

To satisfy his sexual perversion, Jeffrey Doland flew to Miami to meet Kathy, a woman he met online who agreed to let him forcibly dunk her two young girls in a pool or bathtub ``until the bubbles stop rising,'' prosecutors say.

Read More →
Articlesby David SpraggsFebruary 1, 2009

Turn Their Gadgets Against Them

"I love Facebook!" came the shout from the cubicle next to mine. One of my fellow detectives here at the Boulder (Colo.) Police Department—through a simple Internet search—had just discovered the identity of a sex assault suspect.

Read More →
Newsby Staff WriterJanuary 30, 2009

FBI Agent Spent Three Years Undercover with Identity Thieves

Salesmen and parents know the technique well. It's called the takeaway, and as far as Keith Mularski is concerned, it's the reason he kept his job as administrator of online fraud site DarkMarket.

Read More →
Ad Loading...
Articlesby David GriffithNovember 1, 2003

How To Investigate Cybercrime

Today and every day, thousands of people worldwide are being victimized by computer crime. That’s why just about every major municipal or county law enforcement agency in the United States now has a new breed of detective: the computer crime or “cybercrime” investigator.

Read More →